Using “honeypots” to understand hacker habits

Device manufacturer Panasonic has found a “unique” way to “test” the vulnerability of smart devices which include its own like refrigerators, and so on.

At a recent event in London, Hikohiro Y Lin, General Manager of the company and Yuki Osawa, Senior Engineer, made a presentation on ” Operation Honeypot”.

As per the plan, Panasonic is able to collect information on threats by connecting its own devices in the development / pre-shipment phases to a “honeypot” developed by the company.

The company said since its deployment, Panasonic had been able to find 179 million attack cases and 25 thousand malware samples, of which 4,800 were unique samples targeting the Internet of Things (IoT).

We have developed a system where information being collected through the honeypot is sent to a Sandbox for automated analysis, to address our concern for having a limited number of security experts. What this system allows Panasonic to do is collect “malware targeting/exploiting Panasonic IoT devices” for quicker remediation, in addition to “popular malware” targeting a wide-range of IoT devices.

Panasonic Team at BlackHat Europe, 2019, London

In the session, the Panasonic team of experts explained it analysed malware that was being collected in this fashion. By leveraging this information, Panasonic aims to develop products that are resilient to such attacks.


Leave a Reply

Click here to opt out of Google Analytics